‘Honey Trap’ Sites Recruiting Israeli Spies

Websites are offering work to Iranians and Iranian proxies in Syria and Lebanon as spies for Israel and these offers are believed to be a counter-intelligence effort driven by Iran's security services.

Investigators at online news website, The Daily Beast, have found the sites as part of an investigation into a series of apparent phishing websites that spoofed think tanks and news organisations focused on the Middle East and national security.  Those sites include domains meant to trick users into believing they were associated with prestigious news outlets across the Middle East.

At least 16 sites were identified using the same proposition, phrasing, logos, phone numbers to lure people working in sensitive security jobs in the Hezbollah terror group in Palestine, the Assad regime in Syria, or in Iran itself. Neither the cyber security firm Mandiant, nor Google or Facebook, where the sites had accounts, were able to identify who lies behind the phishing domains.

The recruiting sites have surfaced and disappeared over a four-year period, targeting users in Iran, Syria, and Lebanon through Google Ads.

Displaying a picture of the Israeli flag and a contact number with an Israeli country code, a website called 'VIP Human Solutions’  advertises itself as the “VIP center for recruitment of the most distinguished in the military and security services of Syria and Hezbollah in Lebanon” that “specialises in research and consultancies in the studies of security and political science in all corners of the world." The Human Solutions’ site promises rapid hiring decisions and big salaries.

Security researchers suspect the intelligence job sites are part of an Iranian counter intelligence effort and say that certain that  these websites are fake and have no  connection to Israel’s genuine  spy services.

The Israel Defence Force (IDF) has previously uncovered a scam by Hamas militants to spy on its soldiers by hacking their mobile phones after posing as women on social media. Members of the Palestinian group found the soldiers online, then tried to strike up a friendship using the fake identities and dozens of IDF soldiers were persuaded to install an application that controlled their phone cameras and microphones.

The Israeli National Cyber Directorate has issued a general warning to Israeli businesses to be aware of potential cyber attacks, as the country faced an uptick in hacking attempts. In December last year, Israeli cyber security firm Check Point said that a hacking group identified with the Iranian regime was aiming to attack Israeli targets.

Daily Beast:     Times of Israel:     Media Line:      BBC

You Might Also Read:

Israel & Iran Locked In Cyber Conflict:

 

« Ransomware Attack On French Ministry of Justice
Britain's Cyber Security Strategy Focuses On Resilience »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Celestix Networks

Celestix Networks

Celestix is a global provider of secure network solutions that enable the simple deployment of secure remote access connectivity.

Cleo

Cleo

Cleo is a leader in secure information integration, enabling both ease and excellence in business data movement and orchestration.

iboss Network Security

iboss Network Security

The iboss cloud is designed to deliver Network Security as a Service, in the cloud, using the best malware engines, threat feeds and log analytics engines.

Organization for Security and Co-operation in Europe (OSCE)

Organization for Security and Co-operation in Europe (OSCE)

OSCE is the world's largest security-oriented intergovernmental organization. Areas of activity include Cyber/ICT security.

Cross Identity

Cross Identity

Cross Identity (formerly Ilantus Technologies) is a complete IAM solution that is deep, comprehensive, and can be implemented even by non-IT persons.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Convercent

Convercent

We offer comprehensive and integrated compliance management, reporting, and analytics. A 360-degree view of compliance drives efficiency by aligning initiatives and data into a single dashboard.

CSO GmbH

CSO GmbH

CSO GmbH provide specialist consultancy services in the area of IT security.

APERIO

APERIO

APERIO, the global leader in industrial data integrity, helps its customers drive profitability and sustainability while mitigating risk in their industrial operations.

Kasm Technologies

Kasm Technologies

Kasm Browser Isolation - Protect your organization from malware, ransomware and phishing by using zero-trust containerized browsers.

Aigner Business Solutions

Aigner Business Solutions

Aigner Business Solutions GmbH is a specialist in IT-Security and Data Protection. Concise and focussed.

PA Consulting

PA Consulting

PA Consulting Group is a consultancy that specialises in strategy, technology and innovation. Our cyber security experts work with you to spot digital and technology security risks and reduce them.

Redbot Security

Redbot Security

Redbot Security provides industry leading manual penetration testing. Protecting critical systems and data - red team attack and breach simulations, (OT) critical infrastructure testing.

Tidal Cyber

Tidal Cyber

We formed Tidal for one simple reason—we believe that defenders need and deserve tools and services that make achieving the benefits of threat-informed defense practical and sustainable.

Nexer

Nexer

Nexer is a modern tech company with expertise in strategy, technology and communication with a strong vision.

63 Moons Technologies (63MT)

63 Moons Technologies (63MT)

63 Moons Technologies is a world leader in providing next-generation technology ventures, innovations, platforms, and solutions.